Categories: Cyber CrimeMalware

Nigeria 419 scam targeting business world with RATs

Experts at Palo Alto Networks uncovered a new Nigeria 419 scam scheme which is targeting businesses in a malicous campaign dubbed Silver Spaniel.

The Nigeria 419 schema adopted by criminal gangs world wide has been improved by scammers which are also including the use of remote access trojans (RATs).

A report published by the Palo Alto Networks firm titled “419 Evolution” revealed that scammmers are targeting businesses in Taiwan and South Korea with a malware purchased on hacker forums.

The Nigeria 419 scam is a popular form of upfront payment or money transfer scam, the name “Nigerian scam” was assigned because the first wave of illegal activities came from Nigeria, meanwhile the ‘4-1-9’ part of the name comes from the section of Nigeria’s Criminal Code which discovered the fraud scheme.

The scammers contact the victim by email or letter and offer him a share in a large sum of money that they want to transfer out of their country. Scammers ask the victim to pay money or give them his bank account details to help them transfer the money.

Usually they try to deceive victims requesting the payment to solve a situation that has caused the block of the money transfer, for example, internal disorders in their country, government restrictions or taxes in the scammer’s country.

Palo Alto experts have uncovered a new sophisticated campaign dubbed “Silver Spaniel” as explained in the report:

“Our team is tracking this activity under the code name Silver Spaniel. These attacks have deployed commodity tools that can be purchased for small fees on underground forums and deployed by any individual with a laptop and an e-mail address. Two specific tools were used in multiple attacks that gave the actors the ability to take control of a system without being detected by antivirus programs. Despite the effectiveness of these tools, some of these actors showed remarkably poor operational security that revealed their infrastructure and real world identities. ” states the study on the evolution  of Nigeria 419.

The investigation started in May, after that some customers of Palo Alto Networks detected a malicious phishing campaign, which used e-mail attachment named “Quatation For Iran May Order.exe”, “Samples Photos Oct Order.exe” and “New Samples Required.exe”

“This sample is a variant of the NetWire RAT crypted with a tool named DataScrambler to avoid AV detection”

It is important to note that bad actors behind the Silver Spaniel campaign do not appear to build any tools on their own, they have always used malware sold by other criminal gangs on underground forums.

The experts believe that actors responsible for this new Nigeria 419 scam haven’t high cyber capabilities, they never exploited any software vulnerabilities for their campaign, but instead they relied entirely on social engineering to trick victims into installing malware.

“The tactics, techniques and procedures deployed by Silver Spaniel actors indicate their sophistication level is low compared to that of nation-state sponsored actors and advanced cyber criminals. While many actors use commodity RATs like NetWire, running an operation from a PC and not being careful to avoid exposing one’s actual IP address shows a lack of concern for or knowledge of operational security. “

It was just the tip of the iceberg, because experts identified multiple attacks that exhibited similar characteristics, the operation is currently tracked by Palo Alto as part of the Silver Spaniel campaign.

The new  Nigeria 419 schema uses RATs like NetWire, which is a multi platform malware which allows attackers to control victims, or DataScrambler which is used to avoid detection by defensive solutions before distributing the file as an e-mail attachments.

 

As explained by Rick Howard, CSO of Palo Alto Networks, the scammers had shifted their aims from at-home users, to higher income accounts of businesses using data-stealing RATs.

“419 scammers are typically pretty low-end and tend to go after the typical consumer, not the businesses,” “noticing more and more of these attacks [targeting] the business world,” Howard said.

The report on the new Nigeria 419 scam is full of details on the investigation, it includes a list of malicious domains that have been linked with the Silver Spaniel campaign and provides information on the malware used by fraudsters in malicious email attachments.

Pierluigi Paganini

Security Affairs –  (Nigeria 419 scam, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

7 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

9 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

10 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

12 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

14 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 day ago

This website uses cookies.